Xi Jun Lin

Orcid: 0000-0002-8818-8436

According to our database1, Xi Jun Lin authored at least 35 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems.
J. Syst. Archit., September, 2023

2021
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021

Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021

Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021

Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2021

2020
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020

Leakage-free ID-Based Signature, Revisited.
Comput. J., 2020

2019
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.
Comput. J., 2019

2018
Certificateless public key encryption with equality test.
Inf. Sci., 2018

Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018

Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.
IEICE Trans. Inf. Syst., 2018

An efficient RSA-based certificateless public key encryption scheme.
Discret. Appl. Math., 2018

On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018

Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018

2017
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017

A Passive Client-based Approach to Detect Evil Twin Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations.
IACR Cryptol. ePrint Arch., 2016

Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016

2015
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015

Comment on "Identity-based non-interactive key distribution with forward security".
Des. Codes Cryptogr., 2015

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015

2013
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2013

Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications.
IACR Cryptol. ePrint Arch., 2013

Fully Deniable Mutual Authentication Protocol Based on RSA Signature.
IACR Cryptol. ePrint Arch., 2013

Efficient CCA-secure Threshold Public-Key Encryption Scheme.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IACR Cryptol. ePrint Arch., 2013

2011
Cheating immune visual cryptography scheme.
IET Inf. Secur., 2011

2010
Step construction of visual cryptography schemes.
IEEE Trans. Inf. Forensics Secur., 2010

A new definition of the contrast of visual cryptography scheme.
Inf. Process. Lett., 2010

Some Extensions on Threshold Visual Cryptography Schemes.
Comput. J., 2010

2009
The alignment problem of visual cryptography schemes.
Des. Codes Cryptogr., 2009

2008
Many-to-one encryption and authentication scheme and its application.
J. Commun. Networks, 2008

Colour visual cryptography schemes.
IET Inf. Secur., 2008

Analysis of an authenticated identity-based multicast scheme.
IET Commun., 2008


  Loading...